A digital signature is equivalent to a handwritten signature in paper, and a digital signature serves three basic purposes. Digital signature is commonly used for software distribution, financial transactions and other cases where it is important to detect forgery. Digital signatures are very popular with e-mail users.
In this video, I will talk about the digital, uses, and the whole process of creating and sending digitally signed document over the Internet.
Keep in mind, digital signature is not about encrypting document, just like paper-based signature.
Playlist: Basic Cryptography
https://www.youtube.com/watch?v=vk3py9M2IfE&list=PLSNNzog5eyduN6o4e6AKFHekbH5-37BdV
Advanced Cryptography:
https://www.youtube.com/watch?v=TmA2QWSLSPg&list=PLSNNzog5eydtwsdT__t5WtRgvpfMzpTc7
Please subscribe to my channel!
Please leave comments or questions!
Many thanks,
Sunny Classroom

Link to My Blog:- http://techdjdey.blogspot.in/
Video Editor used:- HitFilm 4 Express. https://hitfilm.com/
Screen recorder used:- iSpring Free Cam 8. https://www.ispringsolutions.com/ispring-free-cam
Music:- Elektronomia-Sky High. https://www.youtube.com/watch?v=TW9d8vYrVFQ
PLEASE LIKE AND SHARE THIS VIDEO.
SUBSCRIBE to my Channel here:- https://www.youtube.com/channel/UCFKcqq9IOdwHdgfq6GEL8gw?sub_confirmation=1
My other videos:- https://www.youtube.com/channel/UCFKcqq9IOdwHdgfq6GEL8gw/videos
IGNORE THESE BELOW:
1. what is the difference between steganography and cryptography
c cryptography
c cryptography example
c cryptography library
c cryptography tutorial
cryptographic protocol
e cryptography
f# cryptography
lightweight cryptography
nonlinear cryptography
o cryptography
r cryptography
what does cryptography have to do with math
what does cryptography look like today
what is a certificate in cryptography
what is a cipher in cryptography
what is a crib in cryptography
what is a generator cryptography
what is a hash cryptography
what is a nonce in cryptography
what is a public key cryptography
what is a quantum cryptography
what is a seed in cryptography
what is a symmetric cryptography
what is advantages of cryptography
what is asymmetric key cryptography
what is biometric cryptography
what is bitcoin cryptography
what is broken cryptography
what is cbc cryptography
what is chaos cryptography
what is chaotic cryptography
what is cipher cryptography
what is classical cryptography
what is cloud cryptography
what is confusion and diffusion in cryptography with example
what is conventional cryptography
what is cryptographic hash function
what is cryptographic hash functions examples
what is cryptography
what is cryptography algorithm
what is cryptography and cryptanalysis
what is cryptography and encryption
what is cryptography and history
what is cryptography and how is it used
what is cryptography and how is it used in it security
what is cryptography and its importance
what is cryptography and its types
what is cryptography and network security
what is cryptography and network security ppt
what is cryptography and network security wikipedia
what is cryptography and number theory
what is cryptography and steganography
what is cryptography and theoretical informatics
what is cryptography and why is it important
what is cryptography and why is it used
what is cryptography basics
what is cryptography computer
what is cryptography define the process of encryption and decryption
what is cryptography definition
what is cryptography doc
what is cryptography encryption
what is cryptography engineering
what is cryptography error
what is cryptography explain
what is cryptography explain in detail
what is cryptography explain its types
what is cryptography hashing
what is cryptography how is it used in it security
what is cryptography in .net
what is cryptography in c#
what is cryptography in computer
what is cryptography in computer network
what is cryptography in computer security
what is cryptography in cyber security
what is cryptography in hindi
what is cryptography in information security
what is cryptography in java
what is cryptography in mathematics
what is cryptography in network security
what is cryptography in networking
what is cryptography in operating system
what is cryptography in os
what is cryptography in registry
what is cryptography in security
what is cryptography in simple language
what is cryptography in web security
what is cryptography key
what is cryptography key management
what is cryptography law
what is cryptography library
what is cryptography method
what is cryptography module
what is cryptography network security
what is cryptography next generation
what is cryptography pdf
what is cryptography ppt
what is cryptography provide an example
what is cryptography quora
what is cryptography rng seed
what is cryptography salary
what is cryptography salt
what is cryptography service
what is cryptography slideshare
what is cryptography software
what is cryptography system
what is cryptography teach ict
what is cryptography technique
what is cryptography technology
what is cryptography tools
what is cryptography tutorial point
what is cryptography types
what is cryptography used for
what is cryptography used for today
what is cryptography video
what is cryptography virus
what is cryptography wikipedia
what is cryptography with diagram
what is cryptography with example
what is cryptography yahoo
what is cryptography yahoo answers
what is cryptography youtube
what is data cryptography
what is des cryptography
what is difference between cryptography and encryption
what is difference between cryptography and steganography
what is diffusion cryptography
what is digital cryptography
what is discrete logarithm in cryptography
what is distributed cryptography
what is dna cryptography
what is dsa cryptography
what is ecc cryptography
what is elementary cryptography

[Hindi] Explain Cryptography - encryption - Decryption - Private key - Public key
Friends in this video I explain what is cryptography in Hindi . I also explain what is encryption , decryption ,private key , public key etc .
---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- DISCLAIMER
The information provided in this video is to be used for educational purpose only.
The video creater in no way responsible for any misuse of the information provided . All of the information in this video is meant
to hep the viewer develop a hacker defence attitude in order to prevent tha attack discussed. In noway should you use the information to cause any kind of damage directly or indirectly . The word hack or hacking in this video should be regarded as ethical hack or ethical hacking respecively.
----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
NOTE : All content used is copyright to TECHACKTRICK,
Use or commercial display or editing of the content without proper
authorization is not allowed. THANK YOU..

Viewers like you help make PBS (Thank you 😃) . Support your local PBS Member Station here: https://to.pbs.org/donateinfi
What happens when you divide things that aren’t numbers?
Tweet at us! @pbsinfinite
Facebook: facebook.com/pbsinfinite series
Email us! pbsinfiniteseries [at] gmail [dot] com
RESOURCES
Visual Group Theory by Nathan Carter https://www.amazon.com/Visual-Group-Theory-Problem-Book/dp/088385757X
Geek37 - The silver ratio and the octagon
https://www.youtube.com/watch?v=o-6kWnYfdVk
Polygons, Diagonals, and the Bronze Mean by Antonia Redondo
Buitrago
https://link.springer.com/content/pdf/10.1007/s00004-007-0046-x.pdfl
Previous Episodes:
Beyond the Golden Ratio
https://www.youtube.com/watch?v=MIxvZ6jwTuA&t=600s
The Multiplication Multiverse
https://www.youtube.com/watch?v=H4I2C3Ts7_w
The Mathematics of Diffie Hillman Key Exchange
https://www.youtube.com/watch?v=ESPT_36pUFc
How to Break Cryptography
https://www.youtube.com/watch?v=12Q3Mrh03Gk&t=130s&list=PLa6IE8XPP_glwNKmFfl2tEL0b7E9D0WRr&index=42
We all know you can’t divide by the number zero. But in some sense the notion of “dividing by zero” appears every time you use modular arithmetic! The structures that underlie this “modding business” are called equivalence relations and quotient sets. And that’s what I’d like to dive into today.
Written and Hosted by Tai-Danae Bradley
Produced by Rusty Ward
Graphics by Ray Lux
Assistant Editing and Sound Design by Mike Petrow and Meah Denee Barrington
Made by Kornhaber Brown (www.kornhaberbrown.com)
Special thanks to Roman Pinchuk for supporting us on our Converse level on Patreon.
Along with thanks to Matthew O'Connor, Yana Chernobilsky, and John Hoffman who are supporting us on Patreon at the Identity level!
And thanks to Nicholas Rose and Mauricio Pacheco for supporting us at the Lemma level!

The Biggest Ideas in Science from Quanta Magazine.
Order now at https://mitpress.mit.edu/books/alice-and-bob-meet-wall-fire
https://www.quantamagazine.org/
Facebook: https://www.facebook.com/QuantaNews
Twitter: https://twitter.com/QuantaMagazine
Sign up for our weekly newsletter: http://eepurl.com/6FnWj

In this session, Mark explains how blockchains work, including how they use hashes, transactions, blocks and proof-of-work consensus algorithms to build distributed ledgers. He presents the capabilities of some of the most common blockchain networks, then describes how the COCO Framework addresses their limitations to make blockchains suitable for a wide variety of business consortiums.
Create a Free Account (Azure): https://aka.ms/c9-azurefree

Bruce Schneier, American cryptographer, computer security and privacy specialist, will be coming to Google to talk about his new book:
"Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World"
"You are under surveillance right now.
"Your cell phone provider tracks your location and knows who’s with you. Your online and in-store purchasing patterns are recorded, and reveal if you're unemployed, sick, or pregnant. Your e-mails and texts expose your intimate and casual friends. Google knows what you’re thinking because it saves your private searches. Facebook can determine your sexual orientation without you ever mentioning it.
"The powers that surveil us do more than simply store this information. Corporations use surveillance to manipulate not only the news articles and advertisements we each see, but also the prices we’re offered. Governments use surveillance to discriminate, censor, chill free speech, and put people in danger worldwide. And both sides share this information with each other or, even worse, lose it to cybercriminals in huge data breaches.
"Much of this is voluntary: we cooperate with corporate surveillance because it promises us convenience, and we submit to government surveillance because it promises us protection. The result is a mass surveillance society of our own making. But have we given up more than we’ve gained? In Data and Goliath, security expert Bruce Schneier offers another path, one that values both security and privacy. He shows us exactly what we can do to reform our government surveillance programs and shake up surveillance-based business models, while also providing tips for you to protect your privacy every day. You'll never look at your phone, your computer, your credit cards, or even your car in the same way again." (W.W. Norton & Co., Inc)